Date: Thu, 5 Dec 1996 11:15:43 -0700 (MST) From: Nate Williams <nate@mt.sri.com> To: freebsd-security@freebsd.org Subject: forwarded message from Steve Lalonde Message-ID: <199612051815.LAA16900@rocky.mt.sri.com>
next in thread | raw e-mail | index | archive | help
------- start of forwarded message (RFC 934 encapsulation) ------- From: "Steve Lalonde" <steve@enta.net> Sender: owner-bsdi-users@lists.gateway.com To: <bsdi-users@bsdi.com> Subject: innd 1.5 Date: Thu, 5 Dec 1996 17:38:46 -0000 just seen this in bugtraq thought you guys/girls might like to know. In article <yy3ybfks8kj.fsf@velo.pp.vix.com>, James Brister <brister@vix.com> wrote: > >I'm pleased to announce the first full release of an ISC sponsored version >of INN (version 1.5). INN 1.5 contains a serious remotely exploitable security hole. I would not recommend using this version as released. The security hole allows outsiders to execute arbitrary commands on your news server, by embedding the commands in the headers of control messages. This security hole still exists even if your control.ctl file disallows all automatic group creation, or if your control.ctl file is set up to run the pgpverify program on control messages. Also, it doesn't matter whether outsiders have TCP connectivity to your news server, only that their news articles can reach your server somehow. Outsiders' access will have the uid of innd (often username "news"). This is the same issue I posted about in news.software.nntp on 7 July 1995 <3tjsk4$fu8@senator-bedfellow.MIT.EDU>. This security hole also exists in previous versions of INN, including INN 1.4 and (to the best of my knowledge) "inn1.4unoff4", although I have not installed or used any of the "inn1.4unoff" packages myself. I think the attached patch will fix this problem for INN 1.5. I also suspect that the changes it makes will have essentially the same effect on versions of INN based on 1.4. For the INN 1.4 release, it also should fix an unrelated problem associated with text mailed by the rmgroup script possibly having a line-initial ~ generated by echo "${FROM} requested that ${P1} be removed." (This is a different ~ problem than the one in "1.4sec" or "1.4sec2".) This ~ issue is the only reason I know of that the patch below is preferable to the patch I posted in 1995. However, the patch below is possibly more consistent with the INN 1.5 code, in terms of how strings are checked and how restrictive the character set is for strings manipulated by a script that uses the sh "eval" command. Matt *** parsecontrol.old Fri Nov 29 18:32:18 1996 - --- parsecontrol Tue Dec 3 01:50:43 1996 *************** *** 15,21 **** az=abcdefghijklmnopqrstuvwxyz ZN=0123456789 # Attempt to sanitize the address ! FROM="`echo \"$1\" | tr ${AZ} ${az} | tr -dc ${az}${ZN}+-_.@%`" REPLYTO="$2" case "$3" in "") - --- 15,21 ---- az=abcdefghijklmnopqrstuvwxyz ZN=0123456789 # Attempt to sanitize the address ! FROM="`echo \"$1\" | tr ${AZ} ${az} | tr -dc \\\055${az}${ZN}+_.@%`" REPLYTO="$2" case "$3" in "") *************** *** 55,60 **** - --- 55,76 ---- writelog $MOST_LOGS/badcontrol.log "`date` Bad header by ${FROM}" exit fi + fi + + # Check characters in values of variables that will be inside an eval + TRANS1="`echo \"$1\" | tr ${AZ} ${az} | tr -dc \\\055${az}${ZN}+_.`" + if [ ${1}X != ${TRANS1}X ]; then + rm -f ${TEMP} + ${SED} -e 's/^~/~~/' < ${ARTICLE} \ + | ${MAILCMD} -s "Malformed newsgroup name by ${FROM}" ${NEWSMASTER} + exit + fi + TRANSP="`echo \"$PROG\" | tr ${AZ} ${az} | tr -dc \\\055${az}${ZN}+_.`" + if [ ${PROG}X != ${TRANSP}X ]; then + rm -f ${TEMP} + ${SED} -e 's/^~/~~/' < ${ARTICLE} \ + | ${MAILCMD} -s "Unexpected program name by ${FROM}" ${NEWSMASTER} + exit fi ACTION=mail Steve Lalonde Systems Manager ENTANET International Ltd The answer is YES whats the question? ------- end -------
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199612051815.LAA16900>